Cryptolocker Ransomware makes different Bitcoin wallet for each victim

On successful connection, the server generates a pair of 2048-bit RSA public and private key and the malware receives only the public key and a newly generated Bitcoin address. For each victim, only the Cryptolocker authors have access to the decryption private keys. The received information from the server gets stored in the system registry at: HKEY_CURRENT_USER\Software\Cryptolocker_NUMBER\ Which contain the values PublicKey, Version Info with Bitcoin address and the command and control server address in an encrypted form. Cryptolocker uses a solid encryption scheme as well, which so far appears unbreakable. It begins encrypting documents on any local or network storage drive, which are in any of these formats: *.odt*.ods*.odp*.odm*.odc*.odb*.doc*.docx*.docm*.wps*.xls*.xlsx*.xlsm*.xlsb*.xlk*.ppt*.pptx*.pptm*.mdb*.accdb*.pst*.dwg*.dxf*.dxg*.wpd*.rtf*.wb2*.pdf*.mdf*.dbf*.p...